Summary, Summary -16, Enterasys nac deployment models -16 – Enterasys Networks 9034385 User Manual

Page 38

Advertising
background image

Summary

2-16 NAC Deployment Models

Summary

Enterasys supports all of the five key NAC functions: detection, authentication, assessment, 
authorization, and remediation. However, not all five functions need to be implemented 
concurrently in a NAC deployment to derive value from the solution. The four NAC deployment 
models each yield unique value propositions to the IT personnel managing the network, and 
provide a logical progression to deploying the full Enterasys NAC solution. 

The following table summarizes the value and features of each deployment model.

.

Table 2-5 Enterasys NAC Deployment Models

Deployment Model

Value

Model 1:
End-System Detection
and Tracking

• End-system and user tracking.
• IP-to-ID functionality for Security Information Management

(SIM).

Model 2:
End-System
Authorization

In addition to the values from Model 1:
• Location-based authorization using Security Domains and “Lock

MAC” features.

• Special handling of end-systems or users with MAC/User

overrides that let you specify a unique set of authentication and
authorization parameters for particular devices or users.

• MAC registration where new end-systems register via a web

page before being allowed access to the network.

• Location-independent end-system quarantine action with

NetSight Automated Security Manager integration.

Model 3:
End-System
Authorization with
Assessment

In addition to the values from Models 1 and 2:
• Security posture compliance verification of connecting end-

systems with dynamic quarantine action using integrated or
external assessment.

Model 4:
End-System
Authorization with
Assessment and
Remediation

In addition to the values from Models 1, 2, and 3:
• Self-service remediation of non-compliant end-systems without

impacting IT operations.

Advertising